Numbertheory with Sagemath

Total Page:16

File Type:pdf, Size:1020Kb

Numbertheory with Sagemath NumberTheory with SageMath Following exercises are from Fundamentals of Number Theory written by Willam J. Leveque. Chapter 1 p. 5 prime pi(x): the number of prime numbers that are less than or equal to x. (same as π(x) in textbook.) sage: prime_pi(10) 4 sage: prime_pi(10^3) 168 sage: prime_pi(10^10) 455052511 Also, you can see π(x) lim = 1 x!1 x= log(x) with following code. sage: fori in range(4, 13): ....: print"%.3f" % (prime_pi(10^i) * log(10^i) / 10^i) ....: 1.132 1.104 1.084 1.071 1.061 1.054 1.048 1.043 1.039 p. 7 divisors(n): the divisors of n. number of divisors(n): the number of divisors of n (= τ(n)). sage: divisors(12) [1, 2, 3, 4, 6, 12] sage: number_of_divisors(12) 6 1 For example, you may construct a table of values of τ(n) for 1 ≤ n ≤ 5 as follows: sage: fori in range(1, 6): ....: print"t(%d):%d" % (i, number_of_divisors(i)) ....: t (1) : 1 t (2) : 2 t (3) : 2 t (4) : 3 t (5) : 2 p. 19 Division theorem: If a is positive and b is any integer, there is exactly one pair of integers q and r such that the conditions b = aq + r (0 ≤ r < a) holds. In SageMath, you can get quotient and remainder of division by `a // b' and `a % b'. sage: -7 // 3 -3 sage: -7 % 3 2 sage: -7 == 3 * (-7 // 3) + (-7 % 3) True p. 21 factor(n): prime decomposition for integer n. sage: factor(12) 2^2 * 3 sage: for p,e in factor(12): ....: print p,e ....: 2 2 3 1 p. 24 sigma(n, k): The sum of kth powers of the positive divisors of jnj. For example, sigma(12; 3) = 13 + 23 + 33 + 43 + 63 + 123 = 2044: sage: sigma(12, 2) 210 sage: sigma(12, 3) 2044 2 Note that we can rewrite sigma(n, k) as m Y k k kei (1 + pi + ··· pi ) i=1 e1 em when n = p1 ··· pm . sage: def my_sigma(n, k): ....: prod =1 ....: for p,e in factor(n): ....: psum=0 ....: fori in range(0, e + 1): ....: psum+=p^(k*i) ....: prod*=psum ....: return prod ....: sage: my_sigma(12, 3) == sigma(12, 3) True 3 Chapter 2 p. 32 gcd(n, m): Finds the greatest common divisor of n and m. sage: gcd(15, 21) 3 p. 33 xgcd(n, m): Finds bezout's coefficient and the GCD of n and m. sage: g, a, b = xgcd(123, 54) sage: gcd(123, 54) == g True sage: a * 123 + b * 54 == g True Note that we can find bezout's coefficient with extended euclidean algorithm. sage: def my_xgcd(n, m): ....: if n == 0: ....: return (m, 0, 1) ifm>=0 else (-m, 0, -1) ....: else: ....: g,x, y = my_xgcd(m %n, n) ....: return (g, y - (m // n) * x, x) ....: sage: g, a, b = my_xgcd(123, 54) sage: gcd(123, 54) == g True sage: a * 123 + b * 54 == g True Also you can see how euclidean algorithm works with following code. sage: def my_euclidean(n, m): ....: if abs(m) < abs(n): ....: m,n=n,m ....: r = m % n ....: while r != 0: ....: print"%d=%d*%d+%d" % (m, n, m // n, r) ....: m,n=n,r ....: r = m % n ....: print"%d=%d*%d" % (m, n, m // n) ....: sage: my_euclidean(741, 715) 741 = 715 * 1 + 26 715 = 26 * 27 + 13 26 = 13 * 2 Note that gcd(741; 715) = 13. The implementation of extended euclidean algorithm with least remainder(p. 35) is left for readers. 4 p. 44 lcm(n, m): Finds the least common multiplier for n, m. sage: lcm(15, 21) 105 You can check gcd(n; m) × lcm(n; m) = n × m: sage: gcd(15, 21) * lcm(15, 21) == 15 * 21 True 5 Chapter 3 p. 50 IntegerModRing(n): Declare residue class with modulo n. sage: R = IntegerModRing(10) sage: R(11) 1 sage: R(13) 3 sage: R(3) + R(8) 1 sage: R(3) * R(8) 4 sage: R(3)^-1 7 You can implement your own modular inverse function invmod(a, n): Find b such that a × b ≡ 1 (mod n) with extended euclidean algorithm. p. 53 eulder phi(n): Computes the Euler's totient function φ(n). sage: euler_phi(17) 16 sage: euler_phi(36) 12 sage: 3^euler_phi(10) % 10 == 1 True Note that aφ(n) ≡ 1 (mod n) when (a; n) = 1. p. 54 You can check Theorem 3.8 as following. sage: def my_euler_phi(n): ....: res = n ....: for p,e in factor(n): ....: res*=(1-1/p) ....: return res ....: sage: my_euler_phi(24) == euler_phi(24) True 6 p. 60 crt(a, b, m, n): Find a solution x to the congruences x ≡ a (mod m) and x ≡ b (mod n). crt(rs, ms): Find a simultaneous solution x to the congruences x ≡ ri (mod mi). sage: crt([2, 3], [3, 4]) 11 sage: crt(2, 3, 3, 4) 11 sage: crt([3, 5, 7], [4, 21, 25]) 1307 Note that 1307 is a solution of following system of linear modular equations: x ≡ 3 (mod 4) x ≡ 5 (mod 21) x ≡ 7 (mod 25) p. 63 IntegerModRing(n)[]: Declare polynomial ring of residue class with modulo n. sage: R.<x> = IntegerModRing(5)[] sage: (x - 1) * (x - 2) == (x + 4) * (x + 3) True Also, you can use roots() to find roots of the polynomial. sage: R.<x> = IntegerModRing(5)[] sage: ((x - 5) * (x - 1)^2 * (x - 2)^3).roots() [(0, 1), (1, 2), (2, 3)] 7 Chapter 4 p. 79 primitive root(q): Calculates a primitive roots of q where q is 2, 4, pn or 2pn for a positive integer n and a prime p. sage: primitive_root(17) 3 3 is primitive root in Z=17Z and we have 30 = 1; 31 = 3; 32 = 9; 33 = 10; 34 = 13; 35 = 5; 36 = 15; 37 = 11; 38 = 16; 39 = 14; 310 = 8; 311 = 7; 312 = 4; 313 = 12; 314 = 2; 315 = 1; 316 = 1 Also, you can find discrete logarithm of x to the base g in Z=qZ as following. sage: p = 17 sage: R = IntegerModRing(p) sage: g = primitive_root(p) sage: x = R(g^10) sage: x.log(g) 10 p. 90 nth root(n): Find n-th roots of object if it exists. sage: R = IntegerModRing(17) sage: g = R(primitive_root(17)) sage: g.nth_root(3)^3 == g True sage: g.nth_root(5)^5 == g True 8 Chapter 5 p. 99 kronecker(a, n): Calculates the Legendre symbol or it's generelization, kronecker symbol. sage: kronecker(2, 17) 1 sage: kronecker(14, 17) -1 sage: quadratic_residues(23) [0, 1, 2, 3, 4, 6, 8, 9, 12, 13, 16, 18] sage: [x forx in range(23) if kronecker(x, 23) == 1] [1, 2, 3, 4, 6, 8, 9, 12, 13, 16, 18] You can check multiplicative property of Legendre symbol by sage: def my_kronecker(a, n): ....: prod =1 ....: for p,e in factor(a): ....: ife%2== 0: ....: continue ....: else: ....: prod *= kronecker(p, n) ....: return prod ....: sage: my_kronecker(48, 31) == kronecker(48, 31) True sage: my_kronecker(48, 37) == kronecker(48, 37) True To check the mulitiplicative property of Jacobi symbol, sage: kronecker(2, 3) * kronecker(2, 5) == kronecker(2, 3 * 5) True 9 Chapter 6 p. 127 moebius(n): Calculate Moebius function µ(n). µ(n) = 0 if n is not square free, and otherwise equals (−1)r, where n has r distinct prime factors. For simplicity, µ(0) = 0 and µ(1) = 1. sage: moebius(12) 0 sage: moebius(-5) -1 sage: moebius(-35) 1 sage: moebius(-7) -1 sage: moebius(4) 0 p. 131 floor(x): Find the largest integer not suceeding x. (Same as [x]) ceil(x): Find the smallest integer not preceding x. sage: ceil(5.5) 6 sage: ceil(5) 5 sage: floor(5.5) 5 sage: floor(5) 5 p. 154 zeta(s): The Riemann zeta function. sage: zeta(1) Infinity sage: zeta(2) 1/6* pi ^2 sage: zeta(2.) 1.64493406684823 sage: zeta(RealField(200)(2)) 1.6449340668482264364724151666460251892189499012067984377356 sage: zeta(0) -1/2 10 Chapter 7 p. 187 three squares(n): Write the integer n as a sum of three integer squares if possible. sage: three_squares(389) (1, 8, 18) sage: three_squares(946) (9, 9, 28) sage: three_squares(2986) (3, 24, 49) four squares(n): Write the integer n as a sum of four integer squares. sage: four_squares(3) (0, 1, 1, 1) sage: four_squares(13) (0, 0, 2, 3) sage: four_squares(130) (0, 0, 3, 11) sage: four_squares(1101011011004) (90, 102, 1220, 1049290) 11 Chapter 8 p. 198 (Pell's equation) p Let pi denote the sequence of convergents to the regular continued fraction for n. This se- qi quence is unique. Then the pair (x; y) solving Pell's equation and minimizing x satisfies x = pi and y = qi for some i. This pair is called the fundamental solution. Thus, the fundamental solution may be found by performing the continued fraction expansion and testing each succes- sive convergent until a solution to Pell's equation is found. continued fraction(x): Find continued faction of given real number. You can put nterms to limit the number of terms. numerator(n): Find the numerator of the n-th partial convergent of continued fraction. denominator(n): Find the numerator of the n-th partial convergent of continued fraction. sage: continued_fraction(13/27) [0; 2, 13] sage: 0 + 1/(2 + 1/13) 13/27 sage: continued_fraction(sqrt(2)) [1; 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, ...] sage: continued_fraction(sqrt(21)) [4; 1, 1, 2, 1, 1, 8, 1, 1, 2, 1, 1, 8, 1, 1, 2, 1, 1, 8, 1, ...] sage: continued_fraction(pi) [3; 7, 15, 1, 292, 1, 1, 1, 2, 1, 3, 1, 14, 2, 1, 1, 2, 2, 2, 2, ...] sage: continued_fraction(pi, nterms = 5) [3; 7, 15, 1, 292] Also, you can solve Pell's equation by following: sage: def solve_pell(N, numTry = 100): ....: cf = continued_fraction(sqrt(N)) ....: fori in range(numTry): ....: denom = cf.denominator(i) ....: numer = cf.numerator(i) ....: if numer^2 - N * denom^2 == 1: ....: return numer, denom ....: return None, None ....: sage: solve_pell(21) (55 , 12) sage: 55^2 - 21 * 12^2 1 12.
Recommended publications
  • Number Theoretic Symbols in K-Theory and Motivic Homotopy Theory
    Number Theoretic Symbols in K-theory and Motivic Homotopy Theory Håkon Kolderup Master’s Thesis, Spring 2016 Abstract We start out by reviewing the theory of symbols over number fields, emphasizing how this notion relates to classical reciprocity lawsp and algebraic pK-theory. Then we compute the second algebraic K-group of the fields pQ( −1) and Q( −3) based on Tate’s technique for K2(Q), and relate the result for Q( −1) to the law of biquadratic reciprocity. We then move into the realm of motivic homotopy theory, aiming to explain how symbols in number theory and relations in K-theory and Witt theory can be described as certain operations in stable motivic homotopy theory. We discuss Hu and Kriz’ proof of the fact that the Steinberg relation holds in the ring π∗α1 of stable motivic homotopy groups of the sphere spectrum 1. Based on this result, Morel identified the ring π∗α1 as MW the Milnor-Witt K-theory K∗ (F ) of the ground field F . Our last aim is to compute this ring in a few basic examples. i Contents Introduction iii 1 Results from Algebraic Number Theory 1 1.1 Reciprocity laws . 1 1.2 Preliminary results on quadratic fields . 4 1.3 The Gaussian integers . 6 1.3.1 Local structure . 8 1.4 The Eisenstein integers . 9 1.5 Class field theory . 11 1.5.1 On the higher unit groups . 12 1.5.2 Frobenius . 13 1.5.3 Local and global class field theory . 14 1.6 Symbols over number fields .
    [Show full text]
  • Primes in Quadratic Fields 2010
    T J Dekker Primes in quadratic fields 2010 Primes in quadratic fields Theodorus J. Dekker *) (2003, revised 2008, 2009) Abstract This paper presents algorithms for calculating the quadratic character and the norms of prime ideals in the ring of integers of any quadratic field. The norms of prime ideals are obtained by means of a sieve algorithm using the quadratic character for the field considered. A quadratic field, and its ring of integers, can be represented naturally in a plane. Using such a representation, the prime numbers - which generate the principal prime ideals in the ring - are displayed in a given bounded region of the plane. Keywords Quadratic field, quadratic character, sieve algorithm, prime ideals, prime numbers. Mathematics Subject Classification 11R04, 11R11, 11Y40. 1. Introduction This paper presents an algorithm to calculate the quadratic character for any quadratic field, and an algorithm to calculate the norms of prime ideals in its ring of integers up to a given maximum. The latter algorithm is used to produce pictures displaying prime numbers in a given bounded region of the ring. A quadratic field, and its ring of integers, can be displayed in a plane in a natural way. The presented algorithms produce a complete picture of its prime numbers within a given region. If the ring of integers does not have the unique-factorization property, then the picture produced displays only the prime numbers, but not those irreducible numbers in the ring which are not primes. Moreover, the prime structure of the non-principal ideals is not displayed except in some pictures for rings of class number 2 or 3.
    [Show full text]
  • Nonvanishing of Hecke L-Functions and Bloch-Kato P
    NONVANISHING OF HECKE L{FUNCTIONS AND BLOCH-KATO p-SELMER GROUPS ARIANNA IANNUZZI, BYOUNG DU KIM, RIAD MASRI, ALEXANDER MATHERS, MARIA ROSS, AND WEI-LUN TSAI Abstract. The canonical Hecke characters in the sense of Rohrlich form a set of algebraic Hecke characters with important arithmetic properties. In this paper, we prove that for an asymptotic density of 100% of imaginary quadratic fields K within certain general families, the number of canonical Hecke characters of K whose L{function has a nonvanishing central value is jdisc(K)jδ for some absolute constant δ > 0. We then prove an analogous density result for the number of canonical Hecke characters of K whose associated Bloch-Kato p-Selmer group is finite. Among other things, our proofs rely on recent work of Ellenberg, Pierce, and Wood on bounds for torsion in class groups, and a careful study of the main conjecture of Iwasawa theory for imaginary quadratic fields. 1. Introduction and statement of results p Let K = Q( −D) be an imaginary quadratic field of discriminant −D with D > 3 and D ≡ 3 mod 4. Let OK be the ring of integers and letp "(n) = (−D=n) = (n=D) be the Kronecker symbol. × We view " as a quadratic character of (OK = −DOK ) via the isomorphism p ∼ Z=DZ = OK = −DOK : p A canonical Hecke character of K is a Hecke character k of conductor −DOK satisfying p 2k−1 + k(αOK ) = "(α)α for (αOK ; −DOK ) = 1; k 2 Z (1.1) (see [R2]). The number of such characters equals the class number h(−D) of K.
    [Show full text]
  • The Class Number Formula for Quadratic Fields and Related Results
    The Class Number Formula for Quadratic Fields and Related Results Roy Zhao January 31, 2016 1 The Class Number Formula for Quadratic Fields and Related Results Roy Zhao CONTENTS Page 2/ 21 Contents 1 Acknowledgements 3 2 Notation 4 3 Introduction 5 4 Concepts Needed 5 4.1 TheKroneckerSymbol.................................... 6 4.2 Lattices ............................................ 6 5 Review about Quadratic Extensions 7 5.1 RingofIntegers........................................ 7 5.2 Norm in Quadratic Fields . 7 5.3 TheGroupofUnits ..................................... 7 6 Unique Factorization of Ideals 8 6.1 ContainmentImpliesDivision................................ 8 6.2 Unique Factorization . 8 6.3 IdentifyingPrimeIdeals ................................... 9 7 Ideal Class Group 9 7.1 IdealNorm .......................................... 9 7.2 Fractional Ideals . 9 7.3 Ideal Class Group . 10 7.4 MinkowskiBound....................................... 10 7.5 Finiteness of the Ideal Class Group . 10 7.6 Examples of Calculating the Ideal Class Group . 10 8 The Class Number Formula for Quadratic Extensions 11 8.1 IdealDensity ......................................... 11 8.1.1 Ideal Density in Imaginary Quadratic Fields . 11 8.1.2 Ideal Density in Real Quadratic Fields . 12 8.2 TheZetaFunctionandL-Series............................... 14 8.3 The Class Number Formula . 16 8.4 Value of the Kronecker Symbol . 17 8.5 UniquenessoftheField ................................... 19 9 Appendix 20 2 The Class Number Formula for Quadratic Fields and Related Results Roy Zhao Page 3/ 21 1 Acknowledgements I would like to thank my advisor Professor Richard Pink for his helpful discussions with me on this subject matter throughout the semester, and his extremely helpful comments on drafts of this paper. I would also like to thank Professor Chris Skinner for helping me choose this subject matter and for reading through this paper.
    [Show full text]
  • Arxiv:1408.0235V7 [Math.NT] 21 Oct 2016 Quadratic Residues and Non
    Quadratic Residues and Non-Residues: Selected Topics Steve Wright Department of Mathematics and Statistics Oakland University Rochester, Michigan 48309 U.S.A. e-mail: [email protected] arXiv:1408.0235v7 [math.NT] 21 Oct 2016 For Linda i Contents Preface vii Chapter 1. Introduction: Solving the General Quadratic Congruence Modulo a Prime 1 1. Linear and Quadratic Congruences 1 2. The Disquisitiones Arithmeticae 4 3. Notation, Terminology, and Some Useful Elementary Number Theory 6 Chapter 2. Basic Facts 9 1. The Legendre Symbol, Euler’s Criterion, and other Important Things 9 2. The Basic Problem and the Fundamental Problem for a Prime 13 3. Gauss’ Lemma and the Fundamental Problem for the Prime 2 15 Chapter 3. Gauss’ Theorema Aureum:theLawofQuadraticReciprocity 19 1. What is a reciprocity law? 20 2. The Law of Quadratic Reciprocity 23 3. Some History 26 4. Proofs of the Law of Quadratic Reciprocity 30 5. A Proof of Quadratic Reciprocity via Gauss’ Lemma 31 6. Another Proof of Quadratic Reciprocity via Gauss’ Lemma 35 7. A Proof of Quadratic Reciprocity via Gauss Sums: Introduction 36 8. Algebraic Number Theory 37 9. Proof of Quadratic Reciprocity via Gauss Sums: Conclusion 44 10. A Proof of Quadratic Reciprocity via Ideal Theory: Introduction 50 11. The Structure of Ideals in a Quadratic Number Field 50 12. Proof of Quadratic Reciprocity via Ideal Theory: Conclusion 57 13. A Proof of Quadratic Reciprocity via Galois Theory 65 Chapter 4. Four Interesting Applications of Quadratic Reciprocity 71 1. Solution of the Fundamental Problem for Odd Primes 72 2. Solution of the Basic Problem 75 3.
    [Show full text]
  • By Leo Goldmakher 1.1. Legendre Symbol. Efficient Algorithms for Solving Quadratic Equations Have Been Known for Several Millenn
    1. LEGENDRE,JACOBI, AND KRONECKER SYMBOLS by Leo Goldmakher 1.1. Legendre symbol. Efficient algorithms for solving quadratic equations have been known for several millennia. However, the classical methods only apply to quadratic equations over C; efficiently solving quadratic equations over a finite field is a much harder problem. For a typical in- teger a and an odd prime p, it’s not even obvious a priori whether the congruence x2 ≡ a (mod p) has any solutions, much less what they are. By Fermat’s Little Theorem and some thought, it can be seen that a(p−1)=2 ≡ −1 (mod p) if and only if a is not a perfect square in the finite field Fp = Z=pZ; otherwise, it is ≡ 1 (or 0, in the trivial case a ≡ 0). This provides a simple com- putational method of distinguishing squares from nonsquares in Fp, and is the beginning of the Miller-Rabin primality test. Motivated by this observation, Legendre introduced the following notation: 8 0 if p j a a <> = 1 if x2 ≡ a (mod p) has a nonzero solution p :>−1 if x2 ≡ a (mod p) has no solutions. a (p−1)=2 a Note from above that p ≡ a (mod p). The Legendre symbol p enjoys several nice properties. Viewed as a function of a (for fixed p), it is a Dirichlet character (mod p), i.e. it is completely multiplicative and periodic with period p. Moreover, it satisfies a duality property: for any odd primes p and q, p q (1) = hp; qi q p where hm; ni = 1 unless both m and n are ≡ 3 (mod 4), in which case hm; ni = −1.
    [Show full text]
  • Global Class Field Theory 1. the Id`Ele Group of a Global Field Let K Be a Global Field. for Every Place V of K We Write K V
    Global class field theory 1. The id`ele group of a global field Let K be a global field. For every place v of K we write Kv for the completion of K at v and Uv for the group of units of Kv (which is by definition the group of positive elements of Kv if v is a × real place and the whole group Kv if v is a complex place). We have seen the definition of the id`ele group of K: × JK =−→ lim Kv × Uv , S ∈ 6∈ vYS vYS where S runs over all finite sets of places of K. This is a locally compact topological group containing K× as a discrete subgroup. 2. The reciprocity map Let L/K be an extension of global fields and (L/K)ab the maximal Abelian extension of K in- side L. For any place v of K, we choose a place v′|v in (L/K)ab, and we denote the corresponding ab Abelian extension by ((L/K) )v. The Galois group of this extension can be idenfied with the decomposition group of v in Gal((L/K)ab). For every place v of K we have the local norm residue symbol ab × ab ( , ((L/K) )v): Kv → Gal(((L/K) )v). This local norm residue symbol gives rise to group homomorphisms , (L/K)ab : K× → Gal((L/K)ab) v v ab ab ab by identifying Gal(((L/K) )v) with the decomposition group of v in Gal((L/K) ). Since (L/K) is Abelian, this map does not depend on the choice of a place of L above v.
    [Show full text]
  • Polynomial-Time Algorithms in Algebraic Number Theory
    Polynomial-time algorithms in algebraic number theory Written by D.M.H. van Gent Based on lectures of H.W. Lenstra Mathematisch Instituut Universiteit Leiden Netherlands July 19, 2021 1 Introduction In these notes we study methods for solving algebraic computational problems, mainly those involving number rings, which are fast in a mathematically precise sense. Our motivating problem ∗ Q ni is to decide for a number field K, elements a1; : : : ; at 2 K and n1; : : : ; nt 2 Z whether i ai = 1, which turns out to be non-trivial. From basic operations such as addition and multiplication of integers we work up to computation in finitely generated abelian groups and algebras of finite type. Here we encounter lattices and Jacobi symbols. Some difficult problems in computational number theory are known, for example computing a prime factorization or a maximal order in a number field. We will however focus mainly on the positive results, namely the problems for which fast computational methods are known. 1.1 Algorithms To be able to talk about polynomial-time algorithms, we should first define what an algorithm is. We equip the natural numbers N = Z≥0 with a length function l : N ! N that sends n to the number of digits of n in base 2, with l(0) = 1. Definition 1.1. A problem is a function f : I ! N for some set of inputs I ⊆ N and we call f a decision problem if f(I) ⊆ f0; 1g. An algorithm for a problem f : I ! N is a `method' to compute f(x) for all x 2 I.
    [Show full text]
  • VECTOR-VALUED HIRZEBRUCH-ZAGIER SERIES and CLASS NUMBER SUMS 1. Introduction the Hurwitz Class Numbers H(N)
    VECTOR-VALUED HIRZEBRUCH-ZAGIER SERIES AND CLASS NUMBER SUMS BRANDON WILLIAMS Abstract. For any number m ≡ 0; 1 (4) we correct the generating function of Hurwitz class number sums P 2 r H(4n − mr ) to a modular form (or quasimodular form if m is a square) of weight two for the Weil representation attached to a binary quadratic form of discriminant m and determine its behavior in the Petersson scalar product. This modular form arises through holomorphic projection of the zero-value of a nonholomorphic Jacobi Eisenstein series of index 1=m. When m is prime, we recover the classical Hirzebruch- Zagier series whose coefficients are intersection numbers of curves on a Hilbert modular surface. Finally we calculate certain sums over class numbers by comparing coefficients with an Eisenstein series. 1. Introduction The Hurwitz class numbers H(n) are essentially the class numbers of imaginary quadratic fields. To be more specific, if −D is a fundamental discriminant then 2h(D) H(D) = w(D) p where h(D) is the class number of Q( −D) and w(D) is the number of units in its ring of integers (in particular, w(D) = 2 for D 6= 3; 4). More generally, 2h(D) X D H(n) = µ(d) σ (f=d) w(D) d 1 djf 2 p if −n = Df , where D is the discriminant of Q( −n), and µ is the M¨obiusfunction, σ1 is the divisor 1 sum, and is the Kronecker symbol; and by convention one sets H(0) = − 12 and H(n) = 0 whenever n ≡ 1; 2 (mod 4).
    [Show full text]
  • On S-Duality and Gauss Reciprocity Law 3
    ON S-DUALITY AND GAUSS RECIPROCITY LAW AN HUANG Abstract. We review the interpretation of Tate’s thesis by a sort of conformal field theory on a number field in [1]. Based on this and the existence of a hypothetical 3-dimensional gauge theory, we give a physical interpretation of the Gauss quadratic reciprocity law by a sort of S-duality. Introduction The Gauss quadratic reciprocity law is arguably one of the most famous theorems in mathematics. Trying to generalize it from different directions has been a central topic in number theory for centuries. In the form of Artin reciprocity law, or class field theory, abelian reciprocity laws are well-understood and has been a beautiful part of algebraic number theory for a long time. However, the sought for general reciprocity laws is still in a very unclear stage, for example the Langlands program, regarded as a nonabelian generalization of class field theory, is far from settled. On the other hand, S-duality (or strong-weak duality) is a common name for many amazing stories in physics, which can be traced back at least to the theo- retical work on electric-magnetic duality and magnetic monopoles. S-duality for classical or quantum U(1) gauge theory is more or less well-understood theoreti- cally. However, S-duality for nonabelian gauge theories remains mysterious, or at least largely conjectural. In recent years, people are making huge progress in in- terpreting the geometric Langlands program by nonabelian S-dualities. One may consult [9] for such an example. However, as far as we know, there is little work on trying to interpret number theory reciprocity laws by S-duality of some physical theory.
    [Show full text]
  • Higher-Degree Supersingular Group Actions
    Higher-degree supersingular group actions Mathilde Chenu1,2 and Benjamin Smith2,1 1Laboratoire d’Informatique (LIX), CNRS, École polytechnique, Institut Polytechnique de Paris, Palaiseau, France 2Inria, Palaiseau, France Abstract We investigate the isogeny graphs of supersingular elliptic curves over F?2 equipped with a 3-isogeny to their Galois conjugate. These curves are interesting because theyp are, in a sense, a generalization of curves defined over F?, and there is an action of the ideal class group of Q¹ −3?º on the isogeny graphs. We investigate constructive and destructive aspects of these graphs in isogeny-based cryptography, including generalizations of the CSIDH cryptosystem and the Delfs–Galbraith algorithm. Keywords: Isogeny-based cryptography, Supersingular elliptic curves, Endomorphisms 2010 Mathematics Subject Classification: 94A60, 11Y40 1 INTRODUCTION Supersingular isogeny graphs of elliptic curves over F?2 , with their rich number-theoretic and combinatorial properties, are at the heart of an increasing number of pre- and post-quantum cryptosystems. Identifying and exploiting special subgraphs of supersingular isogeny graphs is key to understanding their mathematical properties, and their cryptographic potential. Isogeny-based cryptosystems roughly fall into two families. On one hand, we have the cryptosystems that work in the full ℓ-isogeny graph for various ℓ, including the Charles–Goren–Lauter hash [13], SIDH [30, 23, 17], SIKE [31], OSIDH [16], SQISign [24], and many more. These systems take advantage of the fact that the supersingular ℓ-isogeny graph is a large regular graph with large diameter and excellent expansion and mixing properties (indeed, it is a Ramanujan graph). On the other hand, we have cryptosystems that work in the F?-subgraph supported on vertices defined over F? (or with 9-invariants in F?), such as CSIDH [11], CSI-FiSh [7], and CSURF [10].
    [Show full text]
  • Introduction to Number Theory
    INTRODUCTION TO NUMBER THEORY DANIEL E. FLATH AMS CHELSEA PUBLISHING INTRODUCTION TO NUMBER THEORY 10.1090/chel/384.H INTRODUCTION TO NUMBER THEORY DANIEL E. FLATH AMS CHELSEA PUBLISHING 2010 Mathematics Subject Classification. Primary 11-01. For additional information and updates on this book, visit www.ams.org/bookpages/chel-384 Library of Congress Cataloging-in-Publication Data Names: Flath, Daniel E., author. Title: Introduction to number theory / Daniel E. Flath. Other titles: Number theory Description: [2018 edition]. | Providence, Rhode Island : American Mathematical Society, 2018. | Series: AMS Chelsea Publishing [series] ; 384 | Originally published: New York : Wiley, 1989. | Includes bibliographical references and indexes. Identifiers: LCCN 2018014214 | ISBN 9781470446949 (alk. paper) Subjects: LCSH: Number theory. | AMS: Number theory – Instructional exposition (textbooks, tutorial papers, etc.). msc Classification: LCC QA241 .F59 2018 | DDC 512.7–dc23 LC record available at https://lccn.loc.gov/2018014214 Copying and reprinting. Individual readers of this publication, and nonprofit libraries acting for them, are permitted to make fair use of the material, such as to copy select pages for use in teaching or research. Permission is granted to quote brief passages from this publication in reviews, provided the customary acknowledgment of the source is given. Republication, systematic copying, or multiple reproduction of any material in this publication is permitted only under license from the American Mathematical Society. Requests for permission to reuse portions of AMS publication content are handled by the Copyright Clearance Center. For more information, please visit www.ams.org/publications/pubpermissions. Send requests for translation rights and licensed reprints to [email protected]. c 1989 held by Daniel E.
    [Show full text]